It’s the most frightening time of the year for IT – but it doesn’t have to be
Halloween may have passed but there’s still plenty to be afraid of when it comes to IT management. It also means the we are almost at the halfway point of the final quarter of the calendar year. Which often means salespeople and other deal makers at your business are deeply enmeshed in efforts to end the year on a high note.
This end-of-year push can place significant demands on IT and IT management at your business.
- If the end-of-year holidays cause spikes or lulls in demand, you may need to scale your IT management staff and resources up or down until the season ends.
- End-of-year holidays may result in critical members of your IT management or […]
Because your users are also your clients
You may not think marketing and sales are parts of IT management very often, or at all, but as an IT manager, you must be prepared to address these challenges too. Fortunately, effective, comprehensive IT management can help you do so successfully, and increase user satisfaction and productivity and IT business value.
Your Users, Your Clients
Every time you launch a new IT-powered application, resource or service, its intended users’ broad and rapid adoption drive its success. To maximize adoption, you must do more than simply toss the new offering into the marketplace and at those users. You must also promote your new application and encourage your target audience to buy and use it, before, during and after the launch.
Such marketing and sales efforts may be unfamiliar […]
Are Your Children’s Identities Safe at School?
The school year has now started in much of the world. Christmas and other end-of-year holidays are approaching. This chronology highlights a particularly insidious cyber security threat: the theft of children’s identities.
As MarketWatch.com reported during August 2018, a study found more than 1 million children were victims of identity fraud during 2017. The resulting costs? Approximately $2.6 billion.
“With limited financial history or existing account activity, children are the most likely to become victims of new-account fraud, the research showed. These attacks can occur before children even become active Internet users, with some two-thirds of victims being under the age of eight.”
Sadly, research indicates a family or friend commits approximately one-third of child identity theft. Hackers, however, are increasingly targeting children for identity theft as […]
Don’t Grow Your Team – Amplify It
The IT skills shortage of today reminds me of a story from the 18th century.
As the story goes, the composer and musician Franz Josef Haydn decided his orchestra needed a break from its extended “working vacation” at the summer palace of his patron, Prince Nicolas Esterházy; however, no one dared complain to the prince. Haydn, therefore, wrote a symphony (#45 in F sharp) with an ending that spoke for him and his orchestra. As the piece ended, one by one, each musician stood, extinguished the candle in front of him and walked from the stage, until only two remained. The popular name of the piece was the “Farewell” Symphony. The prince received the message, and everyone was able to go home to his family soon […]
Can You Trust Your CMDB?
There is a powerfully true aphorism about computing that’s been around for decades: “garbage in, garbage out.” And it has never been more true – or more important – than when it is applied to the challenges of modern IT management.
Your business absolutely requires consolidated, powerful, flexible, and reliable IT resources to do business. And those resources are the foundation upon which your business is building its path toward digital transformation. Your IT infrastructure must therefore be as available, reliable, secure, and highly performant as possible. All the time. Everywhere.
None of this is possible without effective management of your IT estate. And such management is impossible without accurate, complete, up-to-date information about what’s going on across your IT infrastructure.
IT Management: Too Much Data, Not Enough Actionable Information